Chicago CISO Virtual Executive Summit

December 2, 2020 | 8:00am - 4:00pm CST

December 2, 2020 | 8:00am - 4:00pm CST


Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Chicago CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations


Waqas Akkawi

SIRVA Worldwide

Amy Bogac

Director, Information Security and Risk Management

Jim Cameli

Walgreens Boots Alliance
VP & Global Chief Information Security Officer

Ricardo Lafosse

Kraft Heinz

JJ Markee

Chief Information Security Officer

Arlan McMillan

Kirkland & Ellis
Chief Security Officer

Paolo Vallotti

Mondelez International
Global Chief Information Security Officer


December 2, 2020

8:00am - 8:45am CST Virtual Summit Keynote

Defending Your Data in a Remote Working World

Amy Bogac headshot

Amy Bogac

Director, Information Security and Risk Management


Ricardo Lafosse headshot

Ricardo Lafosse


Kraft Heinz

Ryan Kalember headshot

Ryan Kalember

EVP, Cybersecurity Strategy


It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organization. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.

Join Ryan Kalember, EVP, Cybersecurity Strategy at Proofpoint as he and a CISO panel discuss:

  • How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
  • The ways in which remote work and the move to the cloud has changed the nature of threats to data
  • Approaches to better detect and respond to risky user actions with sensitive data

8:45am - 9:00am CST Break

9:00am - 10:00am CST Virtual Summit Boardroom

Utilizing a Network Digital Twin to Reduce Risk

Shane Hibbard headshot

Shane Hibbard

Director of Information Security


Ken Townsend headshot

Ken Townsend



Brandon Heller headshot

Brandon Heller

Co-Founder & CTO

Forward Networks

Gartner is anticipating a big surge in digital twin usage over the next 5 years; and mention digital twins for the network, in particular. More than ever before, your business depends on network availability and performance. Exploring resources, such as a digital twin, enables network operators to reduce outages, drastically improve troubleshooting measures, and eliminate errors.

Join this boardroom session to discuss:

  • How today’s security teams can leverage a network digital twin to streamline operations
  • Methods to more effectively collaborate
  • Best practices to reduce risk

9:00am - 10:00am CST Virtual Summit Boardroom

The Changing Face of Insider Threat

Victor Hsiang headshot

Victor Hsiang

Information Security Director


Ralston Simmons headshot

Ralston Simmons


William Blair & Company

Gorka Sadowski headshot

Gorka Sadowski

Chief Strategy officer


As an organizational capability, insider threat management is changing - again. Firstly, the idea of context has changed the categories of insider threat, and secondly insider threat programs   now maturing – evolving into amore justifiable and friendly trusted insider program.

Join this virtual boardroom to discuss:

  • The evolving landscape of insider threats and its challenges
  • The impact of changing behaviors, employee culture and workplace environment on insider risk 
  • Practical strategies for improving an insider risk management program

9:00am - 10:00am CST Virtual Summit Boardroom

Bringing Cloud Back Down to Earth

Mahmood Khan headshot

Mahmood Khan

SVP & Global CISO


Bill Podborny headshot

Bill Podborny


Constellation Brands

Amy Claire Smith headshot

Amy Claire Smith

Executive Cloud Security Architect, IBM Security


CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. With the security and success of the organization at stake, CISOs must know how to ask the right questions and “talk cloud” with the rest of the organization – all while avoiding being seen as “the office of ‘no.’”

Join this session to learn:

  • The latest solutions for effective security in the cloud
  • Strategies to transfer legacy information security governance to a cloud paradigm
  • Frameworks to evaluate hybrid on-prem and cloud approaches where appropriate

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address:

9:00am - 10:00am CST Virtual Summit Boardroom

SAP Security 101 — 5 Things Every CISO Should Be Doing to Secure SAP

Roberto Gutierrez headshot

Roberto Gutierrez



Justin Metallo headshot

Justin Metallo


Volkswagen Financial Services

Jason Frugé headshot

Jason Frugé

VP, Business Application Cyber Security


Traditional cybersecurity investments have focused on defending the perimeter with little attention paid to the application layer. More importantly, those applications enable the most critical business functions of your organization, such as financials, ERP, CRM, HR, manufacturing and the supply chain. With SAP as the core framework of many large enterprises, it presents an attractive target for malicious actors. Building from basic security hygiene up to advanced concepts, you as the CISO can play a core role in ensuring that strategic operations and processes of your business are protected.

Join this session to learn:

  • How and why you should include SAP security in your overall cybersecurity strategy
  • Fundamental concepts for SAP mission-critical application cybersecurity & compliance
  • Methods for achieving continuous compliance across SAP applications
  • Strategies for measuring and mitigating risk throughout your SAP landscape

10:00am - 10:45am CST Virtual Summit Keynote

The Convergence of Zero Trust and SASE

Robert Schuetter headshot

Robert Schuetter

Chief Information Security Officer


Jason Clark headshot

Jason Clark

Chief Strategy Officer


Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • Insights from organizations adopting SASE and zero trust today

10:45am - 11:00am CST Break

11:00am - 12:00pm CST Virtual Summit Boardroom

Navigating the Application and Network Threat Landscape

Elizabeth Ogunti headshot

Elizabeth Ogunti


JBT Corporation

Paolo Vallotti headshot

Paolo Vallotti

Global Chief Information Security Officer

Mondelez International

Venkat Thummisi headshot

Venkat Thummisi

Global Cyber Security Market Strategist


Organizations are increasingly operating in an agile digital model where data flows seamlessly between on-premise networks, applications and cloud services. Yet that coherent user experience masks a complex attack surface, where security leaders must tackle a spectrum of vulnerabilities while preserving agile business operations. 

Join this session to discuss:

  • The latest threat landscape for networks and applications
  • How CISOs are navigating the balance of business agility and security controls 
  • Best practices for monitoring threats across complex networks

11:00am - 12:00pm CST Virtual Summit Boardroom

Cloud IAM — Enlightenment or Inferno

Brian Ekkebus headshot

Brian Ekkebus

Sr. IT Manager of Security, Audit & Compliance


JJ Markee headshot

JJ Markee

Chief Information Security Officer


Brian Johnson headshot

Brian Johnson

SVP, Cloud Security Practice


A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program? 

In this session, you will discuss: 

  • Why managing cloud IAM is so complex 
  • The challenges cloud IAM creates for IT and cybersecurity professionals 
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

11:00am - 12:00pm CST Virtual Summit Boardroom

Aligning Security Priorities for a More Secure 2021

Erik Hart headshot

Erik Hart


Cushman & Wakefield

Frank Yanan headshot

Frank Yanan

SVP / Business Information Security Officer

Bank of America

David Grady headshot

David Grady

Chief Security Evangelist


In cybersecurity, there is so much to do and so little time. It is critical to prioritize your investment and efforts to combat the most likely and most potentially-damaging threats to your organization. Dive into how to use data, research and their hard-earned experience to set your own security priorities for 2021.

During this session, security leaders will share their insights on:

  • How to strengthen your security team and improve engagement and retention
  • Avoiding buzzwords and focus on the true value of emerging technologies
  • Identifying the risks that are most impactful to your organization

11:00am - 12:00pm CST Virtual Summit Boardroom

Security Operations – Empowering Teams

Sam McLane headshot

Sam McLane

Chief Technology Services Officer

Arctic Wolf Networks

Automation in the world of information security allows teams to move more swiftly in the face of persistent threats while stitching together best-in-class tools that get the job done. For smaller companies, the challenge may be having to do more, with less. Rather than eliminating the need for security talent, the use of a security operations team is freeing up bandwidth for analysts and others to engage in the meaningful work that requires a human touch. 

Join this session to learn: 

  • The role of automation and orchestration in today’s security stack  
  • How the dispersion of the workforce has caused an increase in compromises 
  • How-to stay vigilant in the face of Account Takeover Attacks (ATO) 

12:00pm - 12:45pm CST Virtual Summit Keynote

Tomorrow’s Cyberthreats – Staying One Step Ahead

Richard Rushing headshot

Richard Rushing


Motorola Mobility LLC

Sam Curry headshot

Sam Curry

Chief Security Officer


At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.

Join this virtual keynote to explore:

  • Strategies for addressing the emerging threat landscape
  • The role today’s CISO plays in guiding business strategy to mitigate risk
  • Communication strategies for educating users about security – and holding them accountable

12:45pm - 1:15pm CST Networking

Community Discussion

Amy Bogac headshot

Amy Bogac

Director, Information Security and Risk Management


David Grady headshot

David Grady

Chief Security Evangelist


An informal and interactive opportunity for you to network with peers in small groups. 

2:30pm - 4:00pm CST Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.

Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.

  • Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow Chicago CISO Virtual Executive Summit peers.
  • All conversations are private and will not be recorded
  • Meet up to 3 peers based on your shared interests or priorities

Participant Testimonials

  • ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
  • ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
  • ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes

How to Participate 

Available if you sign up and select peer meetings prior to the summit. To join your meetings or download meeting calendar invites, please reference the instructions that were emailed to you from


Your Community Partners

CISO Thought Leaders
Key Partners
Program Partners

Chicago CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program manager.

Tim Bigley